Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pvxj-25m6-7vqr

Опубликовано: 24 апр. 2024
Источник: github
Github: Прошло ревью
CVSS4: 8.7
CVSS3: 8.8

Описание

Rancher Privilege escalation vulnerability via malicious "Connection" header

A vulnerability was discovered in Rancher 2.0.0 through the aforementioned patched versions, where a malicious Rancher user could craft an API request directed at the proxy for the Kubernetes API of a managed cluster to gain access to information they do not have access to. This is done by passing the "Impersonate-User" or "Impersonate-Group" header in the Connection header, which is then correctly removed by the proxy. At this point, instead of impersonating the user and their permissions, the request will act as if it was from the Rancher management server and incorrectly return the information. The vulnerability is limited to valid Rancher users with some level of permissions on the cluster. There is not a direct mitigation besides upgrading to the patched Rancher versions.

Пакеты

Наименование

github.com/rancher/rancher

go
Затронутые версииВерсия исправления

>= 2.0.0, < 2.4.16

2.4.16

Наименование

github.com/rancher/rancher

go
Затронутые версииВерсия исправления

>= 2.5.0, < 2.5.9

2.5.9

EPSS

Процентиль: 59%
0.0038
Низкий

8.7 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-807

Связанные уязвимости

CVSS3: 8.8
nvd
больше 4 лет назад

A Reliance on Untrusted Inputs in a Security Decision vulnerability in Rancher allows users in the cluster to act as others users in the cluster by forging the "Impersonate-User" or "Impersonate-Group" headers. This issue affects: Rancher versions prior to 2.5.9. Rancher versions prior to 2.4.16.

CVSS3: 8.8
fstec
больше 4 лет назад

Уязвимость программного обеспечения управления кластерами Kubernets Rancher, связанная с ошибками при обработке входных данных, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 59%
0.0038
Низкий

8.7 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-807